Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
What is Trigger?
A trigger is a SQL procedure that initiates an action when an event (INSERT, DELETE or UPDATE) occurs. Triggers are kept in and managed by the DBMS. Triggers are used to maintain the referential integrity of data by changing the data in a systematic fashion. A trigger cannot be called or implemented; DBMS automatically fires the trigger as a result of a data modification to the associated table. Triggers can be viewed as same to stored procedures in that both having of procedural logic that is kept at the database level. Stored procedures, though, are not event-drive and are not attached to a specific table as triggers are. Stored procedures are explicitly implemented by invoking a CALL to the procedure whereas triggers are implicitly executed. In addition, triggers can also execute stored procedures.
A relationship set is a set of relationships of the similar type. For example, let consider the relationship among two entities sets course and student. Collection of all the in
Difference between SQL and SQL*Plus SQL SQL*Plus SQL is a language SQL *Plus is an environment It is bas
Guidelines for creation of table: Table name should begin with an alphabet. In table name, single quotes and blank spaces are not allowed. Reserve words of that DBM
Question 1 Draw a Data Flow Diagram for a University scenario Question 2 Discuss the following with suitable examples Relational Algebra Operators Database Pla
Explain the Functional Mode with help of an example. Functional Model The functional model shows a computation and functional derivation of data values in it without ind
What is persistency? Persistency ensures which data is stored and that after the object is no longer available (program stops running) the data will be available to other users
Which method of access uses key transformation? A Hash method of access uses key transformation.
Explain the use of constraints in functional model with suitable example. A constraint shows relationship between two objects at same time, or among various values of the sam
1) Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pict
These permit the user to unload a database or parts of a database and reload the data on the similar machine, or on another machine in a dissimilar location. This can be useful in
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd